Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Sam Altman goes beyond bread rolls to explore life after GPT-5

How your sun roof has become a national security issue

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA adds two n-able n-central flaws to a known exploited vulnerability catalog
Identity

CISA adds two n-able n-central flaws to a known exploited vulnerability catalog

userBy userAugust 14, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 14, 2025Ravi LakshmananVulnerability/Network Security

Known exploited vulnerability catalog

The US Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws affecting N-Abable N-Central to its known Exploited Vulnerabilities (KEV) catalogue, citing evidence of aggressive exploitation.

N-Able N-Central is a remote monitoring and management (RMM) platform designed for managed service providers (MSPs), allowing customers to efficiently manage and secure clients’ Windows, Apple and Linux endpoints from a single unified platform.

The vulnerabilities in question are listed below –

CVE-2025-8875 (CVSS score: N/A) – Unstable desertion vulnerability that could lead to command execution CVE-2025-8876 (CVSS score: N/A) – Command injection vulnerability due to inappropriate disinfection of user input

Both drawbacks are addressed in N-Central versions 2025.3.1 and 2024.6 HF2, released on August 13, 2025. N-ABLE encourages customers to enable Multifactor Authentication (MFA) especially for managed accounts.

Cybersecurity

“These vulnerabilities require authentication to take advantage of,” N-Able said in an alert. “However, for security in an n-central environment, N-Central must be upgraded to 2025.3.1.”

Currently, we don’t know how vulnerabilities are being exploited in real-world attacks, in what context, and what the scale of such efforts is. Hacker News has reached out to n-able for comments and will update the story if there is a reply.

In light of active exploitation, a Federal Private Enforcement Division (FCEB) agency is recommended to apply necessary modifications to ensure the network by August 20, 2025.

The development is the day after CISA placed two years ago security flaws affecting Microsoft Internet Explorer and Office in the KEV catalog –

CVE-2013-3893 (CVSS score: 8.8) – Microsoft Internet Explorer memory corruption vulnerability that enables remote code execution CVE-2007-0671 (CVSS score: 8.8) – Microsoft Office Excel remote code execution vulnerability when realizing a remote code file that enables special code files

The FCEB agency will have time until September 9, 2025 to update to the latest version or discontinue use if the product reaches end-of-life (EOL) status, as in the case of the product in Internet Explorer.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleElon Musk’s Xai co-founder leaves the company
Next Article Google requires crypto app licenses in 15 regions to warn the FBI of $9.9 million fraud loss
user
  • Website

Related Posts

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

August 15, 2025

Taiwanese web server violated by UAT-7237 using customized open source hacking tools

August 15, 2025

Garantex and Grinex sanctions exceeding $100 million for illegal ransom-related crypto transactions

August 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Sam Altman goes beyond bread rolls to explore life after GPT-5

How your sun roof has become a national security issue

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

Taiwanese web server violated by UAT-7237 using customized open source hacking tools

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Web 3.0 Gets Personal: FySelf’s TwinH Paves the Way for User-Controlled Digital Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.